会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Synchronizing split user-mode/kernel-mode device driver architecture
    • 同步拆分用户模式/内核模式设备驱动程序架构
    • US08434098B2
    • 2013-04-30
    • US12027274
    • 2008-02-07
    • Mingtzong LeePeter WielandNar GanapathyUlfar ErlingsonMartin AbadiJohn Richardson
    • Mingtzong LeePeter WielandNar GanapathyUlfar ErlingsonMartin AbadiJohn Richardson
    • G06F3/00G06F13/24G06F11/00
    • G06F9/4812G06F9/545
    • A device driver includes a kernel mode and a user-mode module. The device driver may access device registers while operating in user-mode to promote system stability while providing a low-latency software response from the system upon interrupts. The device driver may include kernel stubs that are loaded into the operating system, and may be device specific code written. The stubs may be called by a reflector to handle exceptions caught by the stubs. A reset stub may be invoked by the reflector when the user-mode module or host terminates abruptly or detects an interrupt storm. The reset stub may also be invoked if errant direct memory access DMA operations are being performed by a hardware device. The reset stub may ensure that hardware immediately stops unfinished DMA from further transfer, and may be called by the user-mode driver module.
    • 设备驱动程序包括内核模式和用户模式模块。 设备驱动程序可以在用户模式下操作时访问设备寄存器,以提高系统稳定性,同时在中断时从系统提供低延迟软件响应。 设备驱动程序可以包括加载到操作系统中的内核存根,并且可以是写入的特定于设备的代码。 存根可以由反射器调用来处理由存根捕获的异常。 当用户模式模块或主机突然终止或检测到中断风暴时,反射器可以调用复位存根。 如果由硬件设备执行错误的直接存储器访问DMA操作,则也可以调用复位存根。 复位存根可以确保硬件立即停止未完成的DMA进一步传输,并且可以由用户模式驱动器模块调用。
    • 6. 发明申请
    • IMPLEMENTATIONS OF PROGRAM RUNTIME CHECKS
    • 方案运行检查的执行情况
    • US20100192026A1
    • 2010-07-29
    • US12360259
    • 2009-01-27
    • Martin AbadiUlfar ErlingssonDaniel LuchaupMarcus Peinado
    • Martin AbadiUlfar ErlingssonDaniel LuchaupMarcus Peinado
    • G06F11/08
    • G06F11/08
    • Runtime checks on a program may be used to determine whether a pointer points to a legitimate target before the pointer is dereferenced. Legitimate addresses, such as address-taken local variables (ATLVs), global variables, heap locations, functions, etc., are tracked, so that the legitimate targets of pointers are known. The program may be transformed so that, prior to dereferencing a pointer, the pointer is checked to ensure that it points to a legitimate address. If the pointer points to a legitimate address, then the dereferencing may proceed. Otherwise, an error routine may be invoked. One example way to keep track of legitimate addresses is to group address-taken variables together within a specific range or ranges of memory addresses, and to check that a pointer has a value within that range prior to dereferencing the pointer. However, addresses may be tracked in other ways.
    • 在指针取消引用之前,可以使用对程序的运行时检查来确定指针是否指向合法目标。 跟踪合法的地址,例如地址采取的局部变量(ATLV),全局变量,堆位置,函数等,以便指针的合法目标是已知的。 程序可以被转换,使得在取消引用指针之前,检查指针以确保它指向合法的地址。 如果指针指向合法的地址,则可以进行取消引用。 否则,可以调用错误例程。 跟踪合法地址的一个示例方法是将地址采集的变量组合在一个特定的存储器地址范围或范围内,并在取消引用指针之前检查指针是否具有该范围内的值。 但是,地址可以以其他方式跟踪。
    • 8. 发明授权
    • Verifiable integrity guarantees for machine code programs
    • 可验证的机器代码程序完整性保证
    • US08104021B2
    • 2012-01-24
    • US11450493
    • 2006-06-09
    • Ulfar ErlingssonMartin AbadiMichael Vrable
    • Ulfar ErlingssonMartin AbadiMichael Vrable
    • G06F9/45
    • G06F21/52G06F12/1441
    • A verifier performs static checks of machine code to ensure that the code will execute safely. After verification is performed, the code is executed. The code modules generated by the rewriter and verified by the verifier prevent runtime code modifications so that properties established by the verifier cannot be invalidated during execution. Guards ensure that control flows only as expected. Stack data that must be shared within a code module, and which may therefore be corrupted during execution, is placed on a separate data stack. Other stack data remains on the regular execution stack, called the control stack. Multiple memory accesses can be checked by a single memory-range guard, optimized for fast access to the most-frequently used memory.
    • 验证者执行机器代码的静态检查,以确保代码将安全执行。 执行验证后,执行代码。 由重写器生成并由验证者验证的代码模块防止运行时代码修改,以便验证者建立的属性在执行过程中不能被无效。 护卫员确保控制只能按预期方式流动。 必须在代码模块中共享的堆栈数据,并且可能在执行期间被破坏的堆栈数据被放置在单独的数据堆栈上。 其他堆栈数据保留在常规执行堆栈中,称为控制堆栈。 多个存储器访问可以由单个存储器范围保护来检查,优化用于快速访问最常用的存储器。